Defensive Security Professional Titles
This page provides standardized job titles, responsibilities, and expectations for defensive security professionals. Use these frameworks to understand career progression, set role expectations, and benchmark compensation.
How to use these tables:
- Levels are displayed as columns for easy vertical comparison
- The attribute column stays fixed while you scroll horizontally
- Scroll horizontally to compare across all levels
SOC Analyst
Security Operations Center professionals who monitor, detect, and respond to security threats and incidents. Serve as the front line of defense, triaging alerts, investigating suspicious activity, and coordinating incident response efforts.
| Attribute | Analyst 1 / Entry | Analyst 2 / Junior | Analyst 3 / Mid | Analyst 4 / Senior / Lead |
|---|---|---|---|---|
| General Description | Entry-level SOC analyst learning security monitoring fundamentals and alert triage processes. Follows established playbooks to investigate and escalate security events. Develops foundational knowledge of security tools, attack patterns, and incident response procedures. | Junior SOC analyst capable of conducting independent alert investigations and participating in incident response activities. Demonstrates proficiency with security monitoring tools and can identify true positive security events. Beginning to develop specialization in specific threat types or tools. | Experienced SOC analyst who leads incident investigations and drives detection improvements. Demonstrates expertise in threat analysis, incident response, and security tool optimization. Serves as subject matter expert for specific threat types or platforms and mentors junior analysts. | Senior SOC analyst and team leader who sets direction for security monitoring and incident response capabilities. Leads the most complex investigations and serves as the escalation point for critical incidents. Drives strategic improvements to detection, response, and SOC operations. |
| Primary Responsibilities |
|
|
|
|
| Required Skills |
|
|
|
|
| Preferred Skills |
|
|
|
|
| Mentorship Requirements | Receives direct mentorship from Senior SOC analysts. Participates in shift handoffs and team briefings. Expected to complete SOC onboarding and tool training within first 3 months. Shadows senior analysts on incident investigations. | Receives guidance from Senior analysts on complex investigations. Expected to begin mentoring Entry-level analysts informally. Participates in knowledge sharing and team training sessions. Should be developing expertise in 1-2 specific areas. | Primary mentor for Junior and Entry analysts. Leads training sessions on specialty areas. Expected to develop and maintain SOC training materials. Establishes reputation as go-to expert in specific domains. | Primary mentor for Mid and Junior analysts. Responsible for team career development. Creates mentorship programs and growth paths. Industry mentorship through community engagement. Shapes SOC analyst development curriculum. |
| Impact Scope | Individual contributor on alert triage and initial investigation. Impact limited to assigned alerts and tickets. Work is reviewed before escalation or closure. Contributes to overall SOC coverage and response time metrics. | Directly contributes to incident detection and response. Responsible for accurate alert triage and investigation. Detection improvements impact organizational security posture. Beginning to influence SOC processes. | Shapes SOC detection capabilities and processes. Leads major incident responses impacting organization. Detection improvements measurably reduce risk. Influences tool selection and investment decisions. | Defines SOC capabilities and strategic direction. Critical incident outcomes depend on leadership. Team development impacts organizational security maturity. Industry influence through thought leadership. |
| Autonomy & Decision Authority | Works under close supervision following playbooks. Follows established escalation procedures. Limited authority to close alerts independently. Escalates all potential incidents to senior team members. | Works with moderate supervision. Can make triage decisions on standard alerts. Authority to close false positives independently. Escalates complex or high-severity incidents. | Works independently with strategic guidance. Makes significant investigation and response decisions. Authority over detection rule development. Consulted on SOC process and tooling decisions. | High autonomy with strategic alignment. Makes significant operational and investment decisions. Authority over SOC processes and standards. Trusted to represent organization during incidents and externally. |
| Communication & Stakeholders | Primarily internal communication with SOC team and shift lead. Documents findings in ticketing system. May participate in shift handoffs. Limited interaction outside immediate team. | Regular interaction with SOC team and incident responders. May communicate with IT teams during incidents. Participates in incident bridges. Documents findings for broader team consumption. | Regular communication with security leadership. Presents findings to technical and management audiences. Primary analyst contact for major incidents. Coordinates with IT, legal, and business stakeholders during incidents. | Executive and board-level communication during incidents. Represents SOC to organizational leadership. Industry conference presentations. Builds relationships with peers at other organizations. |
| Degree / Experience | Bachelor's degree in Computer Science, Cybersecurity, IT, or related field, OR 1-2 years of IT support or helpdesk experience, OR completion of SOC analyst training program with demonstrated practical skills. | Bachelor's degree in Computer Science, Cybersecurity, or related field, OR 2-3 years of SOC or security monitoring experience. Demonstrated investigation skills and tool proficiency. | Bachelor's degree in Computer Science, Cybersecurity, or related field, OR 4-6 years of SOC or incident response experience. Demonstrated leadership in major incident investigations. May have Master's degree with less experience. | Bachelor's or Master's degree in relevant field, OR 6-10 years of SOC or incident response experience. Demonstrated team leadership and strategic impact. Industry recognition through speaking or publications. |
| Certifications |
|
|
|
|
| Salary: US Gov't | $50,000 - $70,000 (GS-7 to GS-9) | $65,000 - $85,000 (GS-9 to GS-11) | $85,000 - $115,000 (GS-12 to GS-13) | $110,000 - $145,000 (GS-14 to GS-15) |
| Salary: US Startup | $55,000 - $75,000 | $70,000 - $95,000 | $95,000 - $130,000 | $130,000 - $170,000 + equity |
| Salary: US Corporate | $50,000 - $70,000 | $65,000 - $90,000 | $90,000 - $120,000 | $120,000 - $160,000 |
Security Administrator
Professionals who implement, configure, and maintain security controls and infrastructure. Responsible for the day-to-day operation of security tools, policy enforcement, and ensuring security systems function effectively to protect organizational assets.
| Attribute | Admin 1 / Entry | Admin 2 / Junior | Admin 3 / Mid | Admin 4 / Senior / Lead |
|---|---|---|---|---|
| General Description | Entry-level security administrator learning to operate and maintain security tools and controls. Performs routine administrative tasks following established procedures. Develops foundational knowledge of security technologies, access management, and policy implementation. | Junior security administrator capable of independently managing security tools and implementing security controls. Demonstrates proficiency in security system administration and can troubleshoot common issues. Beginning to develop expertise in specific security technologies or domains. | Experienced security administrator who independently manages complex security infrastructure and leads implementation projects. Serves as subject matter expert for specific security technologies and mentors junior team members. Contributes to security architecture decisions and process improvements. | Senior security administrator and technical leader who sets direction for security infrastructure and operations. Leads complex enterprise-wide security implementations and serves as the escalation point for critical security system issues. Drives strategic improvements and technology roadmaps. |
| Primary Responsibilities |
|
|
|
|
| Required Skills |
|
|
|
|
| Preferred Skills |
|
|
|
|
| Mentorship Requirements | Receives direct mentorship from Senior security administrators. Shadows on complex tasks and projects. Expected to complete tool-specific training within first 6 months. Participates in team knowledge sharing sessions. | Receives guidance from Senior administrators on complex tasks. Expected to begin mentoring Entry-level team members. Contributes to documentation and procedure development. Should be developing expertise in specific tool sets. | Primary mentor for Junior and Entry administrators. Leads training on specialty tools and technologies. Expected to develop standards and best practices documentation. Establishes reputation as go-to expert in specific domains. | Primary mentor for Mid and Junior administrators. Responsible for team career development and growth. Creates technical career paths and development programs. Industry mentorship through community engagement. |
| Impact Scope | Individual contributor on assigned administrative tasks. Impact limited to routine operations and ticket resolution. Work is reviewed before implementation. Supports overall security operations effectiveness. | Directly maintains security controls protecting organization. Responsible for tool availability and effectiveness. Configuration changes impact security posture. Beginning to influence security infrastructure decisions. | Shapes security infrastructure capabilities. Project outcomes directly impact security posture. Standards and automation improve team effectiveness. Influences technology selection and investment. | Defines security infrastructure capabilities for organization. Strategic decisions impact long-term security posture. Team development impacts organizational maturity. Vendor relationships affect cost and capability. |
| Autonomy & Decision Authority | Works under close supervision. Follows established procedures for all tasks. Limited authority to make configuration changes independently. Escalates non-routine requests to senior team members. | Works with moderate supervision. Can make routine configuration decisions. Authority to implement approved changes independently. Escalates significant changes or non-standard requests. | Works independently with strategic guidance. Makes significant configuration and design decisions. Authority over tool optimization and automation. Consulted on infrastructure and architecture decisions. | High autonomy with strategic alignment. Makes significant infrastructure and investment decisions. Authority over security administration standards. Trusted to represent organization with vendors and partners. |
| Communication & Stakeholders | Primarily internal communication with security team and IT. Responds to tickets from end users. Documents work in ticketing systems. Limited stakeholder interaction outside immediate team. | Regular interaction with IT teams and security stakeholders. Communicates with vendors on support issues. Participates in project meetings. Documents work for team consumption. | Regular communication with security leadership and IT. Presents technical recommendations to stakeholders. Coordinates with vendors on complex issues. Documents standards for broader organization. | Executive-level communication on infrastructure strategy. Represents team to organizational leadership. Presents to steering committees and governance boards. Builds relationships with industry peers. |
| Degree / Experience | Bachelor's degree in IT, Computer Science, Cybersecurity, or related field, OR 1-2 years of IT administration experience, OR completion of relevant technical certification program. | Bachelor's degree in IT, Cybersecurity, or related field, OR 2-4 years of security or IT administration experience. Demonstrated proficiency with security tool administration. | Bachelor's degree in IT, Cybersecurity, or related field, OR 4-6 years of security administration experience. Demonstrated expertise with complex security infrastructure. May have Master's degree with less experience. | Bachelor's or Master's degree in relevant field, OR 6-10 years of security administration experience. Demonstrated team leadership and strategic impact. Industry recognition through certifications or contributions. |
| Certifications |
|
|
|
|
| Salary: US Gov't | $50,000 - $70,000 (GS-7 to GS-9) | $65,000 - $90,000 (GS-9 to GS-11) | $90,000 - $120,000 (GS-12 to GS-13) | $115,000 - $150,000 (GS-14 to GS-15) |
| Salary: US Startup | $55,000 - $80,000 | $75,000 - $100,000 | $100,000 - $140,000 | $140,000 - $180,000 + equity |
| Salary: US Corporate | $50,000 - $75,000 | $70,000 - $95,000 | $95,000 - $130,000 | $130,000 - $170,000 |
Security Engineer
Technical professionals who design, build, and implement security solutions and controls. Focus on developing security capabilities through engineering, automation, and integration. Bridge the gap between security requirements and technical implementation.
| Attribute | Engineer 1 / Entry | Engineer 2 / Junior | Engineer 3 / Mid | Engineer 4 / Senior / Lead | Engineer 5 / Staff | Engineer 6 / Principal |
|---|---|---|---|---|---|---|
| General Description | Entry-level security engineer learning to develop and implement security solutions. Assists with security tool deployments, automation development, and security control implementation. Focuses on building technical skills in security engineering and software development practices. | Junior security engineer capable of independently developing security solutions and automation. Demonstrates proficiency in security engineering practices and can implement security controls in production environments. Beginning to develop expertise in specific security domains or technologies. | Experienced security engineer who independently designs and implements complex security solutions. Leads engineering projects and serves as technical expert for specific security domains. Mentors junior engineers and contributes to security architecture decisions. | Senior security engineer and technical leader who sets technical direction for security engineering initiatives. Leads complex, high-impact projects and serves as the escalation point for difficult engineering challenges. Drives innovation in security capabilities and represents engineering to the broader organization. | Distinguished security engineer who operates at the highest levels of technical excellence. Defines organizational security engineering strategy and drives innovation across the practice. Recognized externally as an industry expert and thought leader in security engineering. | Legendary security engineer at the pinnacle of technical expertise. Sets industry direction and is recognized globally as a defining voice in security engineering. Combines unparalleled technical depth with strategic vision and business impact. |
| Primary Responsibilities |
|
|
|
|
|
|
| Required Skills |
|
|
|
|
|
|
| Preferred Skills |
|
|
|
|
|
|
| Mentorship Requirements | Receives direct mentorship from Senior security engineers. Participates in code reviews and pair programming. Expected to complete engineering onboarding and training. Shadows on security projects and implementations. | Receives guidance from Senior engineers on complex projects. Expected to begin mentoring Entry-level engineers informally. Contributes to engineering standards and documentation. Should be developing expertise in specific areas. | Primary mentor for Junior and Entry engineers. Leads technical training and knowledge sharing. Expected to develop engineering standards and patterns. Establishes reputation as expert in specific domains. | Primary mentor for multiple engineers. Responsible for team career development. Creates engineering development programs. Industry mentorship through community engagement. Shapes engineering culture and practices. | Mentors Senior and Lead engineers. Shapes career paths across organization. Develops mentorship programs. Industry-level mentorship through community engagement. Sponsors high-potential individuals. | Develops organizational leadership pipeline. Mentors future industry leaders. Legacy-building through talent development. May sponsor research and education initiatives. |
| Impact Scope | Individual contributor on assigned engineering tasks. Impact limited to specific components or scripts. Work is reviewed before deployment. Contributes to team automation and tooling improvements. | Directly builds security capabilities protecting organization. Responsible for quality and reliability of developed solutions. Engineering decisions impact security effectiveness. Beginning to influence technical direction. | Shapes security engineering capabilities. Project outcomes directly impact security posture. Engineering decisions set patterns for team. Influences technology selection and architecture. | Defines security engineering capabilities for organization. Strategic decisions impact long-term security posture. Team development impacts organizational maturity. Innovation shapes competitive advantage. | Organizational and industry-level impact. Shapes company technical reputation. Defines engineering capabilities and standards. Influences industry practices through thought leadership. | Global industry impact. Defines how security engineering is practiced. Organizational transformation. Creates lasting contributions to the field. |
| Autonomy & Decision Authority | Works under close supervision. Follows established coding standards and practices. Limited authority to make design decisions independently. Escalates technical questions to senior engineers. | Works with moderate supervision. Can make implementation decisions within defined scope. Authority to merge code following review process. Escalates significant design decisions. | Works independently with strategic guidance. Makes significant design and implementation decisions. Authority over technical approach within projects. Consulted on architecture and technology decisions. | High autonomy with strategic alignment. Makes significant technical and investment decisions. Authority over engineering standards and practices. Trusted to represent organization externally. | Near-complete technical autonomy. Strategic decision-making authority. Influences organizational direction. Authority over technical standards. Trusted advisor to executive leadership. | Complete autonomy over technical domain. Executive-level decision authority. Shapes organizational strategy. May have significant investment authority. |
| Communication & Stakeholders | Primarily internal communication with engineering team. Documents work in code repositories and wikis. Participates in team standups and planning. Limited stakeholder interaction outside immediate team. | Regular interaction with security and engineering teams. Participates in architecture discussions. Documents designs for team review. May present technical solutions to stakeholders. | Regular communication with security leadership and architecture. Presents technical designs to stakeholders. Coordinates with vendors on integrations. Documents patterns for broader organization. | Executive-level communication on engineering strategy. Represents team to organizational leadership. Industry conference presentations. Builds relationships with industry peers and vendors. | C-suite and board-level engagement. Industry-wide communication through publications. Builds relationships with industry peers. Media and analyst engagement. | Global industry presence. Media and public thought leadership. Government engagement. Premier industry venues. |
| Degree / Experience | Bachelor's degree in Computer Science, Software Engineering, Cybersecurity, or related field, OR 1-2 years of software development or IT experience, OR completion of coding bootcamp with security focus. | Bachelor's degree in Computer Science, Software Engineering, or related field, OR 2-4 years of security engineering or software development experience. Demonstrated ability to build security solutions. | Bachelor's degree in Computer Science, Software Engineering, or related field, OR 4-6 years of security engineering experience. Demonstrated track record of successful complex implementations. May have Master's degree with less experience. | Bachelor's or Master's degree in relevant field, OR 6-10 years of security engineering experience. Demonstrated team leadership and strategic impact. Industry recognition through tools, research, or speaking. | Bachelor's or Master's degree in relevant field, OR 10+ years of security engineering experience with demonstrated industry impact. Advanced degree may be expected. Industry recognition is essential. | Advanced degree often present, but industry recognition is primary qualification. 15+ years of elite experience with transformational impact. May be founders or pioneers of major tools or techniques. |
| Certifications |
|
|
|
|
|
|
| Salary: US Gov't | $65,000 - $85,000 (GS-9 to GS-11) | $80,000 - $110,000 (GS-11 to GS-12) | $100,000 - $135,000 (GS-12 to GS-13) | $125,000 - $160,000 (GS-14 to GS-15) | $150,000 - $190,000 (GS-15 / SES equivalent) | $180,000 - $230,000+ (Senior SES equivalent) |
| Salary: US Startup | $75,000 - $100,000 | $95,000 - $130,000 | $130,000 - $170,000 | $160,000 - $210,000 + equity | $200,000 - $270,000 + significant equity | $260,000 - $380,000+ + major equity |
| Salary: US Corporate | $70,000 - $95,000 | $90,000 - $120,000 | $120,000 - $155,000 | $150,000 - $195,000 | $185,000 - $240,000 | $240,000 - $320,000+ |
Security Architect
Strategic technical leaders who design security frameworks, architectures, and strategies for organizations. Focus on translating business requirements into security designs, evaluating technologies, and ensuring security is integrated into enterprise architecture.
| Attribute | Architect 1 / Entry | Architect 2 / Junior | Architect 3 / Mid | Architect 4 / Senior | Architect 5 / Staff | Architect 6 / Principal |
|---|---|---|---|---|---|---|
| General Description | Entry-level security architect learning security design principles and architecture methodologies. Assists with security assessments, documentation, and basic design work. Develops foundational knowledge of security frameworks, threat modeling, and enterprise architecture concepts. | Junior security architect capable of contributing to security design work and conducting basic architecture assessments. Demonstrates proficiency in security frameworks and can perform threat modeling with guidance. Beginning to develop expertise in specific architecture domains. | Experienced security architect who independently leads security design initiatives and architecture assessments. Serves as subject matter expert for specific architecture domains and mentors junior team members. Shapes security standards and patterns for the organization. | Senior security architect who sets direction for enterprise security architecture. Leads complex, high-impact architecture initiatives and serves as the escalation point for difficult design challenges. Drives security architecture strategy and represents architecture to executive stakeholders. | Distinguished security architect who defines organizational security architecture vision and strategy. Recognized externally as industry expert in security architecture. Shapes how security architecture is practiced and drives innovation in architecture methods and frameworks. | Legendary security architect at the pinnacle of architecture expertise. Sets industry direction and is recognized globally as a defining voice in security architecture. Combines unparalleled architectural depth with strategic vision and transformational leadership. |
| Primary Responsibilities |
|
|
|
|
|
|
| Required Skills |
|
|
|
|
|
|
| Preferred Skills |
|
|
|
|
|
|
| Mentorship Requirements | Receives direct mentorship from Senior architects. Shadows on architecture reviews and design sessions. Expected to complete architecture methodology training. Participates in architecture community of practice. | Receives guidance from Senior architects on complex designs. Expected to begin mentoring Entry-level team members. Contributes to architecture standards and patterns. Should be developing expertise in specific domains. | Primary mentor for Junior and Entry architects. Leads architecture training and knowledge sharing. Expected to develop architecture patterns and standards. Establishes reputation as expert in specific domains. | Primary mentor for Mid and Junior architects. Responsible for architecture team development. Creates architecture career paths and programs. Industry mentorship through community engagement. | Mentors Senior architects and emerging leaders. Shapes architecture career paths organization-wide. Industry-level mentorship through community engagement. Develops architecture thought leaders. | Develops organizational leadership pipeline. Mentors future industry leaders. Legacy-building through lasting contributions. May sponsor architecture education initiatives. |
| Impact Scope | Individual contributor on documentation and research. Impact limited to supporting architecture deliverables. Work is reviewed by senior architects. Contributes to architecture team effectiveness. | Directly contributes to security design quality. Responsible for specific architecture components. Design decisions impact project security. Beginning to influence architecture standards. | Shapes security architecture for major initiatives. Design decisions set organizational patterns. Standards and frameworks improve security posture. Influences technology strategy and investment. | Defines security architecture for organization. Strategic decisions impact long-term security posture. Team development impacts organizational maturity. Architecture standards enable business outcomes. | Organizational and industry-level impact. Defines how security architecture is practiced. Shapes organizational security transformation. Influences industry standards and practices. | Global industry impact. Defines how security architecture is practiced. Organizational transformation and long-term success. Creates lasting contributions to the profession. |
| Autonomy & Decision Authority | Works under close supervision. Follows established architecture standards and templates. Limited authority to make design decisions independently. Escalates architecture questions to senior team. | Works with moderate supervision. Can make design decisions within defined scope. Authority to approve standard patterns. Escalates novel or high-risk design decisions. | Works independently with strategic guidance. Makes significant architecture decisions. Authority over design standards and patterns. Consulted on major technology and security decisions. | High autonomy with strategic alignment. Makes significant architecture and strategy decisions. Authority over architecture standards and governance. Trusted to represent organization on architecture matters. | Near-complete architecture autonomy. Strategic decision-making authority. Influences organizational direction. Authority over architecture vision. Trusted advisor to executive leadership. | Complete autonomy over architecture domain. Executive-level decision authority. Shapes organizational strategy. May have significant influence over industry direction. |
| Communication & Stakeholders | Primarily internal communication with architecture team. Documents findings and research. Participates in design review meetings as observer. Limited stakeholder interaction outside immediate team. | Regular interaction with project teams and stakeholders. Presents design recommendations. Participates in architecture review boards. Documents designs for broader consumption. | Regular communication with security and IT leadership. Presents to executive stakeholders. Engages with enterprise architecture. Documents standards for organization. | Executive-level communication on architecture. Presents to board and steering committees. Represents architecture to organizational leadership. Builds relationships with industry peers. | C-suite and board-level engagement. Industry-wide influence through publications. Standards body and industry forum participation. Media and analyst engagement. | Global industry presence. Regulatory and government engagement. Media thought leadership. Premier industry and academic venues. |
| Degree / Experience | Bachelor's degree in Computer Science, Cybersecurity, or related field, OR 2-3 years of security engineering or IT architecture experience. Understanding of security design concepts. | Bachelor's degree in Computer Science, Cybersecurity, or related field, OR 3-5 years of security engineering or architecture experience. Demonstrated ability to contribute to security designs. | Bachelor's degree in relevant field with strong experience, OR Master's degree with moderate experience, OR 5-8 years of security architecture experience. Demonstrated track record of successful architecture initiatives. | Master's degree preferred, OR Bachelor's with 8-12 years of security architecture experience. Demonstrated strategic impact and team leadership. Industry recognition through publications or speaking. | Master's degree or higher often expected, OR 12+ years of security architecture experience with demonstrated industry impact. Industry recognition is essential qualification. | Advanced degree often present, but industry recognition is primary qualification. 15+ years of elite experience with transformational impact. May be founders of major architecture frameworks or methods. |
| Certifications |
|
|
|
|
|
|
| Salary: US Gov't | $75,000 - $95,000 (GS-11 to GS-12) | $90,000 - $120,000 (GS-12 to GS-13) | $115,000 - $150,000 (GS-13 to GS-14) | $140,000 - $175,000 (GS-14 to GS-15) | $165,000 - $210,000 (GS-15 / SES equivalent) | $190,000 - $250,000+ (Senior SES equivalent) |
| Salary: US Startup | $85,000 - $115,000 | $110,000 - $145,000 | $145,000 - $185,000 | $175,000 - $230,000 + equity | $215,000 - $290,000 + significant equity | $270,000 - $400,000+ + major equity |
| Salary: US Corporate | $80,000 - $110,000 | $100,000 - $135,000 | $135,000 - $175,000 | $165,000 - $215,000 | $200,000 - $265,000 | $250,000 - $350,000+ |
Defensive Security Management
Leaders who manage defensive security teams, programs, and business units. Responsible for strategy, people development, stakeholder relationships, and business outcomes. Progress from team management to organizational and executive leadership.
| Attribute | Management 1 / Manager | Management 2 / Senior Manager | Management 3 / Director |
|---|---|---|---|
| General Description | First-line manager responsible for a team of defensive security practitioners. Balances people management with operational oversight. Ensures service quality, team development, and operational excellence. May maintain some hands-on technical work. | Senior manager responsible for multiple teams or a significant security function. Drives strategy, develops managers, and owns outcomes for their area. Balances operational excellence with strategic development and stakeholder management. | Director responsible for a defensive security department or major program area. Sets strategy, owns significant budget, and drives security capability development. Leads senior managers and builds organizational capability while maintaining strong stakeholder and industry relationships. |
| Primary Responsibilities |
|
|
|
| Required Skills |
|
|
|
| Preferred Skills |
|
|
|
| Mentorship Requirements | Primary mentor for direct reports. Responsible for team career development. Develops informal management skills in senior ICs. Participates in management development programs. | Primary mentor for managers and senior ICs. Responsible for leadership development in function. Creates career frameworks and development programs. Industry mentorship presence developing. | Develops senior management talent pipeline. Mentors senior managers and high-potential leaders. Shapes function career frameworks. Industry mentorship through speaking and community engagement. Sponsors emerging leaders. |
| Impact Scope | Team performance and development. Operational outcomes for assigned function. Team retention and growth. Stakeholder relationships. | Function performance and development. Security outcomes for major area. Multi-team capability and maturity. Senior stakeholder relationships. | Function performance and strategic direction. Department financial outcomes. Senior leadership capability. Strategic stakeholder relationships. Industry reputation and influence. |
| Autonomy & Decision Authority | Authority over team operations and assignments. Makes hiring recommendations. Budget authority within defined limits. Escalates strategic decisions to director level. | Significant operational autonomy. Budget authority for function. Authority over strategy within area. Makes significant hiring and investment decisions. Reports to Director or CISO level. | Full authority over function operations. Budget ownership and investment decisions within allocation. Authority over senior hiring and organizational structure. Strategic decision-making for function. Reports to VP, CISO, or executive leadership. |
| Communication & Stakeholders | Regular communication with director leadership. Stakeholder communication on operational matters. Team communication and alignment. Cross-functional coordination. | Executive-level stakeholder engagement. Security leadership communication. May represent security externally. Board-level reporting preparation. | VP and executive leadership engagement. Business unit leader relationships. Industry conference and event presence. Cross-functional executive collaboration. May engage with board on function matters. |
| Degree / Experience | Bachelor's degree in relevant field with 6+ years of defensive security experience including leadership, OR equivalent experience. Technical depth with demonstrated leadership capability. | Bachelor's degree with 8+ years experience including management, OR Master's degree with 6+ years. Demonstrated leadership of managers and function outcomes. | Bachelor's degree with 10+ years including senior management leadership, OR Master's/MBA with 8+ years. Demonstrated budget ownership and function growth. Industry recognition developing. |
| Certifications |
|
|
|
| Salary: US Gov't | $120,000 - $155,000 (GS-14 to GS-15) | $150,000 - $190,000 (GS-15 / SES equivalent) | $170,000 - $210,000 (GS-15 Step 10 / SES equivalent) |
| Salary: US Startup | $145,000 - $190,000 + equity | $180,000 - $250,000 + significant equity | $210,000 - $290,000 + significant equity |
| Salary: US Corporate | $135,000 - $180,000 | $170,000 - $235,000 | $195,000 - $270,000 + bonus |